Presentation is loading. Please wait.

Presentation is loading. Please wait.

All Rights Reserved: JusticeExperts.com Logical Process to a Physical Design Implementing Criminal Justice Technologies in the 21 st Century.

Similar presentations


Presentation on theme: "All Rights Reserved: JusticeExperts.com Logical Process to a Physical Design Implementing Criminal Justice Technologies in the 21 st Century."— Presentation transcript:

1 All Rights Reserved: JusticeExperts.com Logical Process to a Physical Design Implementing Criminal Justice Technologies in the 21 st Century

2 All Rights Reserved: JusticeExperts.com Data (What) Function (How) Network (Where) People (Who) Time (When) Motivation (Why) Objectives/ Scope List of things important to the enterprise List of processes the enterprise performs List of locations where the enterprise operates List of organizational units List of business events/cycles List of business goals/strategies Conceptual (Owners’ View) Entity relationship diagram Business process model Logistics networkOrganization chart with roles, skill sets, security issues Business master schedule Business rules Logical (Architect’s View) Data modelEssential data flow diagram; application architecture Distributed system architecture Human interaction architecture (roles, data, access), security requirements Dependency diagram, entity life history (process structure) Business rule model Physical (Designer’s View) Data architecture (tables and columns); map to legacy data System designSystem architecture (hardware, software types) User interface (how the system will behave), security design “control flow” diagram Business rule design Build & Implement (Programmer’s View) Data design, physical storage design Detailed Program Design Network Architecture Screens, security architecture (who can see what?) Timing definitions Rule specification in program logic Functioning System Converted dataExecutable programs Communications facilities Trained people, using the system Business eventsEnforced rules TECHNOLOGYTECHNOLOGY

3 All Rights Reserved: JusticeExperts.com Logical Design means constructing a high- level solution to a broad and complex problem. In response, a vendor will respond with a proposal to design and deploy a “physical” suite of tools and services (integration suite). Logical Technology Design

4 All Rights Reserved: JusticeExperts.com Internal Requirements Conceptual Vision Realized Vision External Requirements Emerging Technologies Choices BPR Costs & Changes Existing Technologies Impacts Design Decision Test/Adjust Goals/Objectives

5 All Rights Reserved: JusticeExperts.com Design Emerging Standards Internal Requirements External Requirements

6 All Rights Reserved: JusticeExperts.com Design Emerging Standards Internal Requirements External Requirements Business Process Requirements: Multiple-domains of enterprise Conflicting objectives Antiquated manual processes Missing data/data integrity Disparate readiness for automation Logical Design: SEARCH Exchange Model (JIEM) Logical Data Model Logical Technology Requirements: - Distributed n-Tier Hub and Spoke Design - Web Services (WSDL) - Message Oriented Middleware (CORBA, RMI, IIOP, JMS) HTML,XML,XHTML,XACML,XBML,ebXML Conceptual Design: Vision/Goals/Objectives Business Process Models Data Models Technology Models Push-Pull-Publish-Query-Subscribe

7 All Rights Reserved: JusticeExperts.com Design Emerging Standards Internal Requirements External Requirements National Reporting Requirements: NCSC, NCIC, UCR, NIBRS National Standards Requirements: ebXML, ISO 1-1179, NIST, OASIS, EFTS Data Practices and Policy Federal Standards Models: NASCIO, GLOBAL Federal Intelligence Reporting: DHS/FBI Community Right to Know

8 All Rights Reserved: JusticeExperts.com Design Internal Requirements External Requirements Open Architecture (non-proprietary) HTTP TCP/IP Java J2EE.NET C# WSDL UDDI XML/XSLT/XPath Emerging Standards

9 All Rights Reserved: JusticeExperts.com UsabilityScalabilityAuditing InteroperabilityMaintainability Availability ReliabilityIntegrity Security Flexibility Efficiency Performance Event Logging

10 All Rights Reserved: JusticeExperts.com Security Usability Flexibility Auditing Scalability Interoperability Efficiency Availability Reliability Performance Maintainability Integrity Event Logging

11 All Rights Reserved: JusticeExperts.com Evolving Architecture Goals Objectives Logical Design New Business Functions Current EA/SOA Platform Ready Business Needs Analysis Alternative 1 Alternative 3 Alternative 2 Evolved EA/SOA Model CHOOSECHOOSE New As-is-Built Migration Plan/Strategy

12 All Rights Reserved: JusticeExperts.com CountyRegionCounty County Region Region StateSystems XML XMLXML XML XML ICJIS Integration Suite Middleware and Web Services Individual Incident Case Rules XML Registry Index Internet

13 All Rights Reserved: JusticeExperts.com CorrectionsLEProbation Courts DA Defense StateSystems XML XMLXML XML XML ICJIS Integration Suite Middleware and Web Services Individual Incident Case Rules XML Registry Index Internet

14 All Rights Reserved: JusticeExperts.com CJ Technology Model

15 All Rights Reserved: JusticeExperts.com Security Rules Operating System Hardware Application ServicesWeb ServicesMessaging ServicesData Services Workflow Services Event Parser Event Processor Event Rules User Info Rules Registry Data Subscription Services Subscription Engine Monitor & Matching Notification Service Distributed Request Services Request Processor Dispatcher/Collator UI Services Index Logs Directory Services Security Filtering Logging/Auditing Index Services Registry Services Configuration Adapter Services Network Interface Transformation Service Source Interface XML Repository ICJIS Integration Suite

16 All Rights Reserved: JusticeExperts.com 1.Registration – links key documents in different systems 2.Publish – allows agencies to provide data on the backbone in addition to their own systems 3.Subscription – proactive notification of events 4.Query – ability to find individuals, cases and events in attached systems 5.Messaging – standard means of communication among systems 6.Rules-Based Workflow – conditions to be used for processing and workflow 7.Linkages – addt’l functions designed to aid the system and users in accessing and searching through linked data ICJIS is defined by the following functionality:

17 All Rights Reserved: JusticeExperts.com Benefits Links related law enforcement documents together, reducing the chance of records going into “suspense” Links all records of a given individual together, regardless of names or aliases used, where that individual’s identity can be verified using biometrics. Links an individual to all associated criminal justice records on that individual, bridging Law Enforcement and the Judiciary. Example An investigator knows a specific criminal justice agency and the associated RMS case number in that agency - they then automatically receive links to the following associated documents: The incident report Any available property and inventory reports Criminal complaints associated with that incident Search warrants Arrest warrants Arrest reports, etc….

18 All Rights Reserved: JusticeExperts.com Security Rules Operating System Hardware Application ServicesWeb ServicesMessaging ServicesData Services Workflow Services Event Parser Event Processor Event Rules User Info Rules Registry Data Subscription Services Subscription Engine Monitor & Matching Notification Service Distributed Request Services Request Processor Dispatcher/Collator UI Services Index Logs Directory Services Security Filtering Logging/Auditing Configuration Adapter Services Network Interface Transformation Service Source Interface ICJIS Integration Suite XML Repository Index Services Registry Services

19 All Rights Reserved: JusticeExperts.com Benefits Increases query speed Removes need to directly access end systems Example An officer wishes to search for an individual at 2:00 AM, but many major systems are offline or temporarily unavailable. The published index of data informs the officer that the individual has been involved in 15 prior incidents, has 3 separate court disposition documents and is flagged as currently on probation.

20 All Rights Reserved: JusticeExperts.com Security Rules Operating System Hardware Application ServicesWeb ServicesMessaging ServicesData Services Workflow Services Event Parser Event Processor Event Rules User Info Rules Registry Data Subscription Services Subscription Engine Monitor & Matching Notification Service Distributed Request Services Request Processor Dispatcher/Collator UI Services Index Logs Directory Services Security Filtering Logging/Auditing Configuration Adapter Services Network Interface Transformation Service Source Interface XML Repository Index Services Registry Services ICJIS Integration Suite

21 All Rights Reserved: JusticeExperts.com Benefits Automated notification as an event occurs – no need to continuously search for new events Example A probation officer is instantaneously notified when one of their probationers is involved in an incident.

22 All Rights Reserved: JusticeExperts.com Security Rules Operating System Hardware Application ServicesWeb ServicesMessaging ServicesData Services Workflow Services Event Parser Event Processor Event Rules User Info Subscription Rules Registry Data Subscription Services Subscription Engine Monitor & Matching Notification Service Distributed Request Services Request Processor Dispatcher/Collator UI Services Index Logs Directory Services Security Filtering Logging/Auditing Configuration Adapter Services Network Interface Transformation Service Source Interface XML Repository Index Services Registry Services ICJIS Integration Suite

23 All Rights Reserved: JusticeExperts.com Benefits Provides a means for investigators, law enforcement and other criminal justice personnel to find records on individuals, incidents or cases, regardless of which Criminal Justice county, office or system they are stored. Compiles all the data into a single location for ease of selection, comparison and use. Example An investigator wishes to find all individuals, stored in any system in any county in the state, that are Caucasian, between the ages of 25 and 30, between 5’10” and 6’ tall and that have a unique tattoo on their left forearm.

24 All Rights Reserved: JusticeExperts.com Security Rules Operating System Hardware Application ServicesWeb ServicesMessaging ServicesData Services Workflow Services Event Parser Event Processor Event Rules User Info Rules Registry Data Subscription Services Subscription Engine Monitor & Matching Notification Service Distributed Request Services Request Processor Dispatcher/Collator UI Services Index Logs Directory Services Security Filtering Logging/Auditing Configuration Adapter Services Network Interface Transformation Service Source Interface XML Repository Index Services Registry Services ICJIS Integration Suite

25 All Rights Reserved: JusticeExperts.com Benefits Provides a complete communicate infrastructure between Justice Info systems. Enables different Criminal Justice systems to communicate, regardless of platform or software. Example County attorneys create a criminal complaint request. Instead of printing and providing this request to the Courts, the Integration Suite sends a “message” with this document directly to the Courts, allowing them to avoid the need to re-key crucial data.

26 All Rights Reserved: JusticeExperts.com Security Rules Operating System Hardware Application ServicesWeb ServicesMessaging ServicesData Services Workflow Services Event Parser Event Processor Event Rules User Info Workflow Rules Registry Data Subscription Services Subscription Engine Monitor & Matching Notification Service Distributed Request Services Request Processor Dispatcher/Collator UI Services Index Logs Directory Services Security Filtering Logging/Auditing Configuration Adapter Services Network Interface Transformation Service Source Interface XML Repository Index Services Registry Services ICJIS Integration Suite

27 All Rights Reserved: JusticeExperts.com Benefits Allows almost an infinite variety of actions to be performed on data used in the Backbone. Allows new actions to be defined easily to route documents between systems, extract information or perform detailed analyses. Example A rule is created to automatically check for the existence of biometrics and additional incident information on an individual as that individual appears in court. This automatically provides to the judge or court admin the following: 1.A complete criminal history of the individual appearing 2.A notification of the lack of existing biometrics on that individual if required 3.A provision of existing biometrics on the individual summoned to court to compare to the individual actually appearing

28 All Rights Reserved: JusticeExperts.com Security Rules Operating System Hardware Application ServicesWeb ServicesMessaging ServicesData Services Workflow Services Event Parser Event Processor Event Rules User Info Workflow Rules Registry Data Subscription Services Subscription Engine Monitor & Matching Notification Service Distributed Request Services Request Processor Dispatcher/Collator UI Services Index Logs Directory Services Security Filtering Logging/Auditing Configuration Adapter Services Network Interface Transformation Service Source Interface XML Repository Index Services Registry Services ICJIS Integration Suite

29 All Rights Reserved: JusticeExperts.com Benefits Allows users to “walk” through the links between documents and data in the criminal justice system, regardless of the county, office or system in which they are stored. Provides a quick means to search for additional incidents involving an individual’s aliases. Provides a quick means to find more detail on all the incidents an individual has been involved in Example A crime occurs involving 2 individuals. One is apprehended, but only a description of the other individual’s height, weight, race and gender has been determined. An investigator searches for records on the apprehended individual. Once found, it is determined that the individual was involved in a similar incident earlier. The investigator then Searches Linkages to incident and “drills down”, finding links to 3 other individuals involved in the crime. Continuing to Search Linkages, the investigator then links to the 3 other individuals, finding one with a description matching the missing suspect. That detailed record then provides the investigator with key contact information with which to find the suspect.

30 All Rights Reserved: JusticeExperts.com Security Rules Operating System Hardware Application ServicesWeb ServicesMessaging ServicesData Services Workflow Services Event Parser Event Processor Event Rules User Info Workflow Rules Registry Data Subscription Services Subscription Engine Monitor & Matching Notification Service Distributed Request Services Request Processor Dispatcher/Collator UI Services Index Logs Directory Services Security Filtering Logging/Auditing Configuration Adapter Services Network Interface Transformation Service Source Interface XML Repository Index Services Registry Services ICJIS Integration Suite

31 All Rights Reserved: JusticeExperts.com

32 Local Publishing Arm & Registry Policy Decision Point Local Policy Enforcement Point

33 All Rights Reserved: JusticeExperts.com Central PDPCentral RegistryCentral UDDI

34 All Rights Reserved: JusticeExperts.com Central PDPMetadata RegistryCentral UDDISAML Registry

35 All Rights Reserved: JusticeExperts.com Central PDPCentral UDDIMetadata RegistrySAML Registry

36 All Rights Reserved: JusticeExperts.com Central PDPCentral UDDIMetadata RegistrySAML Registry DataDiscovery Server

37 All Rights Reserved: JusticeExperts.com DataExchange Server Central PDP Central UDDIMetadata Registry SAML Registry DataDiscovery Server Query Engine DataDiscovery User Interface Crossflo User Access 1 2 3 3 4


Download ppt "All Rights Reserved: JusticeExperts.com Logical Process to a Physical Design Implementing Criminal Justice Technologies in the 21 st Century."

Similar presentations


Ads by Google